QUESTION 4 Which of the following would be used when a higher level of security is desired for encryption key storage?

A. TACACS+ B. L2TP C. LDAP D. TPM

Answer: D

QUESTION 5 A security administrator needs to determine which system a particular user is trying to login to at various times of the day. Which of the following log types would the administrator check?

A. Firewall B. Application C. IDS D. Security

Answer: D

QUESTION 6 Which of the following MUST be updated immediately when an employee is terminated to prevent unauthorized access?

A. Registration B. CA C. CRL D. Recovery agent

Answer: C

QUESTION 7 Employee badges are encoded with a private encryption key and specific personal information. The encoding is then used to provide access to the network. Which of the following describes this access control type?

QUESTION 18 Separation of duties is often implemented between developers and administrators in order to separate which of the following?

A. More experienced employees from less experienced employees B. Changes to program code and the ability to deploy to production C. Upper level management users from standard development employees D. The network access layer from the application access layer

Answer: B

QUESTION 19 A security administrator needs to update the OS on all the switches in the company. Which of the following MUST be done before any actual switch configuration is performed?

A. The request needs to be sent to the incident management team. B. The request needs to be approved through the incident management process. C. The request needs to be approved through the change management process. D. The request needs to be sent to the change management team.

Answer: C

QUESTION 20 Jane, an individual, has recently been calling various financial offices pretending to be another person to gain financial information. Which of the following attacks is being described?